Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detecting computer data containing compressed video data as banned computer data

a technology of computer data and compressed video, applied in the field of data processing systems, can solve the problems of copyright infringing or otherwise unauthorised, unauthorised and/or copyright infringing video data being distributed via the internet and other mechanisms, and achieve the effect of increasing false alarms and a higher degree of security

Active Publication Date: 2012-10-16
MCAFEE LLC
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011]The invention recognises that a large proportion of banned computer data containing compressed video data uses distinctive decoders that are identified within the computer data and are different from the decoders that are typically used by legitimate computer data containing compressed video data. The banned versions typically tend to use higher degrees of compression than the legitimate versions of the material, so as to ease download or storage on conventional CDs. These higher degrees of compression rely upon their own non-standard decoders. Accordingly, identifying the decoder to be used with some compressed video data and comparing this with predetermined characteristics indicative of whether or not the decoder is associated with banned material is an efficient and effective way of identifying such material. The technique does not seek to characterise the decompressed video data itself, but rather takes the approach of characterising the decoder associated with that compressed video data. This is surprisingly effective and may be relatively readily implemented. Alternatives relying upon the decompression and examination of the compressed video data itself are much less efficient and prone to significant inaccuracies.
[0018]As an alternative approach, possibly giving a higher degree of security at the cost of more false alarms, other embodiments can use identifiers of decoders associated with allowed computer data, e.g. known legitimate decoders, and trigger banned computer data actions if a match with a known allowed decoder is not found.

Problems solved by technology

One type of undesirable computer data which it may be wished to exclude from a computer system is copyright infringing or otherwise unauthorised video data.
There has also arisen a problem with unauthorised and / or copyright infringing video data being distributed via the Internet and other mechanisms.
These compressed versions are often pirate, copyright-infringing versions.
It can be embarrassing, damaging and potentially actionable should such material circulate within a corporate network environment.
In addition to this, the use of such a corporate network to manipulate this kind of material is an inappropriate use of the computing resources of the organisation and likely in contravention to company policy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting computer data containing compressed video data as banned computer data
  • Detecting computer data containing compressed video data as banned computer data
  • Detecting computer data containing compressed video data as banned computer data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]FIG. 1 illustrates a computer network 2, such as a corporate computer network, comprising a gateway server 4, a file server 6 and a plurality of client computers 8, 10, 12. The network 2 is connected via the Internet to provide a plurality of sources of data. Some of these sources of data may be sources of legitimate data, such as an FTP server 14 containing a legal copy of a video file that can be downloaded and used by appropriately authorised persons connected by the Internet. Conversely, another FTP server 16 may store a copy which is a pirate, copyright-infringing version of the video concerned and which it is desired to prevent from being manipulated within the network 2. An email server 18 may serve as a source for the banned material, such as email messages containing the banned material as an email attachment. There are also known number of file sharing schemes whereby banned computer files, such as pirate, copyright-infringing versions of computer files are stored on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Computer data containing compressed video data is examined to see if it is banned computer data, for example containing pirate or copyright-infringing video material, by examining the identifier of the video codec associated with the compressed video data. Certain video codec identifiers are highly correlated with the computer data concerned being banned computer data. Thus, an examination of the header file of the computer data may be used as an efficient and sensitive tool for identifying the computer data as banned computer data.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]This invention relates to the field of data processing systems. In particular, this relates to the detection of computer data containing compressed video data as banned computer data, such as, for example, computer files or streamed computer data containing a copyright infringing movie.[0003]2. Description of the Prior Art[0004]It is known to provide malware scanners, which may for example be web access scanners, email scanners, on demand file scanners, on access file scanners and the like, that serve to detect malware within data being stored, received, manipulated or used in some other way. The threat posed by computer viruses is well known. It is also important in other circumstances, particularly to many businesses, that their computer systems should not be used in connection with improper, inappropriate or otherwise undesirable computer data. As an example, email scanners may be used to scan email traffic for the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00H04N7/173
CPCH04N7/17318H04N21/433H04N21/44008H04N21/4622H04N21/4627H04N21/47202H04N21/4782H04N21/4788H04N21/6125
Inventor HURSEY, NEIL JOHN
Owner MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products